OPC UA server for REXYGEN
Reference manual

REX Controls s.r.o.

Version 3.0.2
Plzeň (Pilsen), Czech Republic
2024-09-07

Contents

Chapter 1
Introduction

1.1 OPC UA

OPC UA is an open communication protocol for industrial automation. Unlike legacy OPC, OPC UA is a multi-platform protocol, it may work as a web service and it offers many advanced functions like diagnostics, method calls and various levels of security and authentication in addition to standard events and data access. OPC UA is becoming a preferred communication interface of many devices from various companies.

However, OPC UA is not a suitable protocol for hard real-time communication between control devices, but is sufficient for soft real-time applications in many cases. A main utilization areas of OPC UA are human-machine interfaces and interconnection of various devices in a heterogeneous environment.

1.2 OPC UA server for REXYGEN

OPC UA server for REXYGEN is as standalone application that is connected to a REXYGEN runtime utilizing a low-level diagnostic protocol. It is not required to run the OPC UA server on the same station where the REXYGEN runtime is running. However, it is advised to run the OPC UA server as close to the REXYGEN runtime as possible to minimize latencies. The OPC UA server for REXYGEN implements the opc.tcp communication protocol, that is the most common protocol for OPC UA servers that acquire data from real-time control devices. The connection of OPC UA with client applications is shown on figure 1.1.

The OPC UA server for REXYGEN obtains the licensing information directly from the connected REXYGEN runtime. The OPC UA server itself operates unlimited. However, if an executive is too large (i.e. contains too many variables), then the OPC UA server refuses to display it. In such a case, a higher OPC UA licence has to be installed on the target REXYGEN runtime.


PIC

Figure 1.1: Connection between OPC UA server, OPC UA clients and REXYGEN runtime

1.3 Provided functionality

The OPC UA server is connected directly to a REXYGEN runtime core. It shows complete structure of a target algorithm (ie. blocks, variables..) in the address space. The server acquires complete structure of the algorithm during startup and make all runtime variables accessible to clients upon request.

A connection to the target device is maintained and checked periodically. The server tries to reinitialize the connection or reconnect to the target device when the connection is lost or an error occurs. Last acquired values are held and available to clients. Value quality is set appropriately. If the target algorithm is changed, the address space is rebuild appropriately and connected clients are notified.

Chapter 2
Address space

An address space contains all the data that is available to clients. Address space is comprised of nodes. Some nodes are common to all OPC UA servers, other nodes are application-specific. There are also nodes that control the server itself. The "Exec" node is a root node to all runtime-specific variables and the whole structure of a target algorithm (ie. tasks, subsystems, blocks and variables) is available underneath this node. A content of the "Exec" node is rebuilt when a connection with a target is established or a control algorithm is changed on the target. A sample address space is shown on figure 2.1. The picture has been taken from UaExpert OPC UA client (see chapter 7.1).


PIC

Figure 2.1: Address space in UaExpert

The server utilizes several name spaces. The first name space corresponds to the application URI and is dedicated for a server diagnostics.

The name space urn:Rex:TypeDeclaration is dedicated for definitions of types that are used among the address space.

The name space urn:Rex:Server is dedicated for commanding the server itself.

A name space that corresponds to the target algorithm is always target-specific and is described in chapter 4.4.2. This name space contains are all nodes that corresponds to the target algorithm.

2.1 Blocks

The structure of address space within the Exec node reflects the structure in a target device that the server is connected to. All nodes are part of the executive name space (see chapter 4.4.2). Node names published in BrowseName and DisplayName correspond to block names in the target device.

There are two distinct objects within the Exec node. The first object is a so-called block. A block represents a task (TaskType), a subsystem (SubsystemType) or a function block (BlockType) on the target device. The second object is a so-called variable. A variable represents a single input, output, state or parameter of a block.

2.2 Variables

Variables are represented by a data type, range and actual value. A range of a data type is stored in the Min and Max nodes. A value is the only node that is constantly synchronized with the target device.

A value of a variable is propagated immediately to the target device upon a write request from a client. However, a cached value may be returned to a client upon a read request if a value age does not exceed specified limit. A maximal age of a value is configured by a SYNC_INTERVAL (see chapter 4.4.1). A variable is also refreshed periodically within this period if a monitoring is established by a client. The process of synchronization is shown on figure 2.2.


PIC

Figure 2.2: A value is stored immediately [1] to the target [2]. A value age is checked upon a read request [3]. If an age limit is exceeded, an actual value is read from the target [4] and cached internally [5]. Finally, a value is sent to the client [6].

A data type of a variable object reflects the data type of a corresponding variable on the target. The names published in BrowseName and DisplayName correspond to the names of corresponding variables in the target device.

Arrays (vector or matrix) are internally divided into small and large arrays. Small arrays are synchronized atomically. Large arrays are synchronized sequentially.

2.3 Events

A version number of a target executive is held internally by the sever. A GeneralModelChangeEvent event is invoked and list of added or removed object is passed on each time a change in the target executive is detected.

Chapter 3
Quick start guide

A configuration file, server’s certificate and a private key (if encryption and authentication are required) are needed to successfully run a server. Following steps have to be done in order to start the server:

  1. Install REXYGEN system with the OPC UA server option enabled.
  2. Create a configuration file by following these steps:
    1. Copy an example configuration from REXYGEN installation (see chapter 4.5).
    2. Change configuration file appropriately (see chapters 4.3 and 6).
  3. Create a certificate if you don’t have one either obtain it by following certificate policy of your company or generate it yourself
    1. Using RexOpcUaConfig (viz kapitolu 6.1)
    2. Using OpenSSL
    3. Using script /etc/rexcore/rexopcua.d/10-cert.sh
      • -i <IP_ADDRESS> – External IP address of the OPC UA server
      • -d <DNS> – External DNS of the OPC UA server
      • -f – Force regenerate certificate
      • -k – Force regenerate private key
  4. Set-up user accounts either directly or by using RexOpcUaConfig (see chapter 6).
  5. Set client certificate options if any of configured endpoint uses client certificates:
    1. Create certificate directories (by RexOpcUaConfig, see 6.1).
    2. Copy trusted client certificates into the folder specified by the CERTIFICATE_TRUST_LIST_PATH configuration option.
  6. Set discovery options appropriately if a discovery service is requested (see 4.4.6):
    1. Find out information about your discovery server.
    2. Copy discovery server’s certificate into corresponding folder.
    3. Set up configuration option in the DISCOVERY section.
      1. SERVER_URL - Endpoint URL of a discovery server.
      2. SECURITY_POLICY - Security policy used to communicate with discovery server.
      3. SERVER_CERTIFICATE_PATH - A patch to a certificate of a discovery server.
      4. ENDPOINT_URL - Endpoint list that is to be published on a discovery server. A single endpoint should be sufficient to register OPC UA server properly.
  7. Run the OPC UA service, see chapter 4.2.

Chapter 4
Startup and configuration

4.1 Startup

The server is configured by a simple configuration file. Its location is specified by the "-c" parameter.

RexOpcUa [-c <configFile>]

Path to the configuration file is set by default in GNU/Linux:

/rex/OpcUa/RexOpcUa.ini

Configuration options are described in chapter 4. The server may also run as a system service – see chapter 4.2). A quick start guide is available in chapter 3.

4.2 System service

The OPC UA server may run as a system service. The system service mode is a default and a recommended mode.

The OPC UA server running as a service may be monitored by a RexTrayMon application that runs in a system tray on Windows platform. (see pictures 4.1, 4.2 a 4.3). It is also possible to start, stop and run configuration utility from RexTrayMon


PIC

Figure 4.1: RexTrayMon application


PIC

Figure 4.2: OPC UA service in RexTrayMon


PIC

Figure 4.3: Options for OPC UA service in RexTrayMon

The OPC UA server runs as a system.d service on a Linux platform. The service may be started from command line using following command:

systemctl start rexopcua

Configuration file path for the server is defined by the CFGFILE option in a service configuration file:

/etc/rexcore/rexopcua.conf

4.3 Configuration

A configuration is stored in a standard INI file format. An UTF-8 encoding is preferred. The content is case-sensitive. There must be no additional space at the start and at the end of a line and around the "=" (equals) symbol. A comment is prefixed by a ";" (semicolon) symbol. A section name is specified within "[]" (square brackets) symbols. Every parameter must have a value. Parameters without values are ignored.

All sections must be identified by a name. A name must be recognized by the server. All recognizable section names are described in following paragraphs. Sections User Token Policy (UTP) Endpoint and Target may have subsections. A single corresponding endpoint or connection is created for every single subsection.

Configuration parameters are described in following paragraphs. Parameters that have a default value are optional. Parameter values may have string, number, arrays or boolean types. A number is always an integer. A boolean value is either Y, YES, ON for logical true or N, NO, OFF for logical false. An array is a set of several values within "[]" (square brackets) symbols divided by a "," (comma) symbol. An empty array is considered as a no value. A file path is a system path to the file. It is either absolute system path or relative to the configuration file.

4.4 Configuration sections

All supported section names of a configuration file are described in following paragraphs.

4.4.1 Target

This section contains options that affect a communication link established with a target device. Details are described in the table 4.1. There is a corresponding Exec node build for every single Target identified by a name defined by TARGET:Exec1.


Table 4.1: Target connection settings




Field

Typ

Default value

Description









ADDRESS

IP address

IP address or DNS of target device that the server should connect to.





PORT

Number

(Optional) Communication port of the target device.





SYNC_INTERVAL

Milliseconds

500

Data synchronization period in milliseconds.





TCP_IDLE_INTERVAL

Milliseconds

30000

Idle notification period to the target in milliseconds. It should be shorter than 60000 ie. 60 seconds.





USERNAME

Text

(Optional) User name when authentication is required by the target.





PASSWORD

Text

(Optional) User password when authentication is required by the target.





USE_SSL

Y/N

N

Enables or disables secure connection using SSL.





CERTIFICATE_PATH

Optional

Path to a client certificate of the target device.





COMMUNICATION_DIAGNOSTICS

Y/N

N

Enable diagnostics of communication with REXYGENem. Create CommunicationDiagnostics object in Exec node.





COMMUNICATION_DIAGNOSTICS_WINDOW_WIDTH

Seconds

10

With of a window utilised for computation of floating average in diagnostics.





WHITE_LIST

Array

Parts of executive to be mirrored. Each part is equivalent to text identifier of NodeID of the mirrored node.





BLACK_LIST

Array

Parts of executive to be ignored. Each part is equivalent to text identifier of NodeID of the ignored node.







Table 4.2: Target connection settings




Field

Typ

Default value

Description









IGNORE_INPUTS

Y/N

N

Ignore blocks’ inputs.





IGNORE_OUTPUTS

Y/N

N

Ignore blocks’ outputs.





IGNORE_PARAMETERS

Y/N

N

Ignore blocks’ parameters.





IGNORE_STATES

Y/N

N

Ignore blocks’ states.





IGNORE_PARAMETER_ARRAYS

Y/N

N

Ignore blocks’ parameter arrays.





IGNORE_STATE_ARRAYS

Y/N

N

Ignore blocks’ state arrays.





IGNORE_LARGE_ARRAYS

Y/N

N

Ignore blocks’ large arrays.





MAX_ARRAY_SIZE

Bytes

65536

Maximum allowed size of arrays.





SMALL_ARRAY_SIZE

Bytes

1024

Maximum size of small arrays.





LARGE_ARRAY_READ_BLOCK_SIZE

Bytes

1024

Size of packet for sequential reading.





LARGE_ARRAY_WRITE_BLOCK_SIZE

Bytes

1024

Size of packet for sequential writing.






When utilising WHITE_LIST a BLACK_LIST, the selected rule is also applied for child nodes (blocks, variables). A rule which is closest to a particular node is applied. If a node is explicitly mirrored then its parent nodes are created as well to preserve the organisation.

4.4.2 Application

The Application section contains main configuration options, see the table 4.3. Both the executive and server name space is configured in the Application section. The server name space is configured by a APPLICATION_URI parameter. The executive name space configuration has the following form:

urn:Rex:Exec:<COMPANY_URI_NAME>:<PROJECT_URI_NAME>: <INSTANCE_URI_NAME>:<TARGET_NAME>

Parameters COMPANY_URI_NAME, PROJECT_URI_NAME and INSTANCE_URI_NAME should be unique for each target device. Multiple OPC UA servers that are connected to the same target device should have these parameters set to the same value. The TARGET_NAME parameter matches the subsection TARGET (see the table 4.4.1).


Table 4.3: Application settings




Field

Typ

Default value

Description









APPLICATION_CERTIFICATE_PATH

File path

Server’s certificate file path.





APPLICATION_PRIVATE_KEY_PATH

File path

Server’s private key file path.





APPLICATION_PRIVATE_KEY_PASSWORD

Text

(Optional) Password to the certificate file.





APPLICATION_URI

Server URI

Server’s URI that is used as a server name space.





COMPANY_URI_NAME

Text

Company identification. It is published in an executive name space.





PROJECT_URI_NAME

Text

Project identification. It is published in an executive name space..





INSTANCE_URI_NAME

Text

Server instance identification. It is published in an executive name space.






4.4.3 Security

The Security section contains configuration of clients certificates ie. validation options and locations. The section is relevant only when any of the configured endpoints has security options set.

The RexOpcUaConfig configuration tool from the REXYGEN installation may be used to create a server certificate and directories for client certificates.


Table 4.4: Security




Field

Typ

Default value

Description









CERTIFICATE_TRUST_LIST_PATH

Directory

Directory for client certificates that are trusted.





CERTIFICATE_REJECTED_LIST_PATH

Directory

Directory in which all rejected certificates by the server are stored. Rejected certificates are not stored if this options is unset.





CERTIFICATE_REVOCATION_LIST_PATH

Directory

(Optional) Directory for client certificates that have been revoked.





CERTIFICATE_ISSUER_LIST_PATH

Directory

(Optional) Directory for certificate authorities





CERTIFICATE_REVOCATION_CHECK_OPTION

N/L/S/A

N

Check of revoked certificates.



NNo check


L Check leaves


S Not self-signed


A All






CHECK_SELF_SIGNATURE

Y/N

N

Checking of self-signed certificates.





CHECK_CERTIFICATE_URL

Y/N

N

Certificate URL and client’s URL must match if enabled.






4.4.4 User Token Policy (UTP)

User Token Policy (UTP) sections define allowed authentication and authorization methods. The options are described in the table 4.5. Modification of user accounts and roles is described in chapters 5 and 6.2.

An authentication policy is specified by a client during connection handshake. No credentials are required within an anonymous connection. Otherwise a valid user name and password and/or valid and trustworthy certificate has to be supplied by a client. A certificate validation can be configured in the same way as a certificate validation for secured connection (see table 4.4).

A list of supported authentication policies has to be defined for every endpoint by the option USER_TOKEN_POLICY. An endpoint may support multiple anonymous policies. A client selects a required policy.

A configuration file with user roles, accounts and encrypted passwords has to be provided for username UTP. An optional parameter OPTIONAL_ENCODING_SALT defines an encoding salt of user passwords in the configuration file.


Table 4.5: User Token Policy (UTP)




Field

Typ

Default value

Description









USER_TOKEN_POLICY_TYPE

Anonymous, Certificate, Username

A type the policy.





AUTH_ROLE

Supervisor, Operator, Observer, AuthorizedUser, Anonymous

(Anonymous, Certificate) An assigned user role.





CREDENTIALS_INI_PATH

File

(Username) A configuration file with user roles, accounts.





OPTIONAL_ENCODING_SALT

Text

q1we58

(Username) Encoding salt for user passwords in configuration file.





CERTIFICATE_TRUST_LIST_PATH

Directory

(Certificate) Folder with trusted client’s certificates.





...

...

(Certificate) Another certificate validation parameters from table 4.4 can be used to configure the validation.






4.4.5 Endpoint

The Endpoint section contains configuration of OPC UA endpoints that are available for clients. Each subsection in the Endpoint defines a single endpoint and must therefore contain all required configuration options. All configuration options are described in table 4.6.

It is recommended not to use a local IP address for an endpoint when a discovery service is required to work. The endpoint address should have following form:

opc.tcp://<IP adresa | DNS>:<port>[/<endpoint>]


Table 4.6: Endpoint settings




Field

Typ

Default value

Description









URL

URL Endpointu

Endpoint URL for connection using the opc.tcp. protocol.





SECURITY_POLICY

Array

Allowed security policies – see details int table 4.7.





USER_TOKEN_POLICY (UTP)

Array

Allowed authentication policies – see table 4.5.





OPEN_WHEN_ALL_BROWSED

Y/N

N

Open Endpoint only when all target are browsed. Mode for poorly implemented OPC UA clients ignoring address space changed events.







Table 4.7: Security policies and level of security (red lowest (deprecated), orange medium, green high and blue ultra high)




Security

Sign

Encrypt

Algorithm









None

No

No





Sign_Basic128Rsa15

Yes

No

Basic128Rsa15





SignEncrypt_Basic128Rsa15

Yes

Yes

Basic128Rsa15





Sign_Basic256

Yes

No

Basic256





SignEncrypt_Basic256

Yes

Yes

Basic256





Sign_Basic256Sha256

Yes

No

Basic256Sha256





SignEncrypt_Basic256Sha256

Yes

Yes

Basic256Sha256





Sign_Aes128Sha256RsaOaep

Yes

No

Aes128Sha256RsaOaep





SignEncrypt_Aes128Sha256RsaOaep

Yes

Yes

Aes128Sha256RsaOaep





Sign_Aes256Sha256RsaPss

Yes

No

Aes256Sha256RsaPss





SignEncrypt_Aes256Sha256RsaPss

Yes

Yes

Aes256Sha256RsaPss






4.4.6 Discovery

The Discovery section configures a discovery service. The section is optional. The ENDPOINT_URL parameter may contain multiple endpoints that are to be discoverable by the service. However it is recommended to specify only a single endpoint. All other endpoints should be enumerable by a client through the single endpoint specified. The ENDPOINT_URL parameter should match at least a single endpoint on the server.

It is necessary to provide a valid URL of a discovery server, valid security options and a certificate location using SERVER_CERTIFICATE_PATH. A certificate should also be registered in the discovery server. Configuration parameters of a discovery service are described in table 4.8.


Table 4.8: Configuration of a discovery service




Field

Typ

Default value

Description









ENDPOINT_URL

Array

(Optional) URL of a discoverable endpoint.





SERVER_CERTIFICATE_PATH

File path

A file path to the server certificate path.





SERVER_URL

URL

URL of a discovery server to which the OPC UA server is registered. The URL must start with opc.tcp://.





SECURITY_POLICY

Policy

Security policy used within the connection to a discovery server. A single policy must be used. The policy must be supported by the discovery server. For more information see table 4.7.





REFRESH_TIME

Milliseconds

30000

Registration refresh interval in milliseconds.






4.4.7 Options

The Options section contains all other parameters that affect server’s behavior. These parameters should be modified only with detailed knowledge of OPC UA specification. All parameters in this section are optional and are described in table 4.9 and 4.10. All interval values are in milliseconds.


Table 4.9: General settings




Field

Typ

Default value

Description









MIN_SAMPLING_INTERVAL

Milliseconds

600

Minimal interval of sampling nodes.





MAX_SAMPLING_INTERVAL

Milliseconds

10000

Maximal interval of sampling nodes.





MIN_PUBLISHING_INTERVAL

Milliseconds

500

Minimal interval pro publishing data to the clients.





MAX_PUBLISHING_INTERVAL

Milliseconds

600000

Maximal interval pro publishing data to the clients.





MIN_SESSION_TIMEOUT

Milliseconds

1000

Minimal client session timeout.





MAX_SESSION_TIMEOUT

Milliseconds

600000

Maximal client session timeout





MAX_PIPED_PUBLISH_REQUEST

Number

5

Maximal count of queued requests for publishing. An error code TooManyPublishRequests is returned if the queue exceeds the limit.





MAX_NODES_TO_ANALYZE_PER_QUERY_REQUEST

Number

100

Maximal count of analyzed nodes in a single client request





MAX_DATA_CHANGE_MONITORING_QUEUE_SIZE

Number

1000

Maximal count of queued requests of monitored items.





MAX_EVENT_MONITORING_QUEUE_SIZE

Number

1000

Maximal count of queued requests of event items.





MAX_DATA_SETS_TO_RETURN

Number

0

Maximal count of data sets to return in a single request.





ENABLE_AUDIT_EVENTS

Y/N

N

Specifies whether an event should be fired if URL of a client does not match a URL in a certificate during creation, activation and cancellation of a session and during a service call.







Table 4.10: General settings




Field

Typ

Default value

Description









ENABLE_DIAGNOSTICS

Y/N

N

Enables standard diagnostic objects on the server.





ALLOW_SWITCH_DIAGNOSTICS

Y/N

N

Enables enabling/disabling standard diagnostic objects by a client.





MIN_DIAGNOSTICS_UPDATE_INTERVAL

Milliseconds

100

Minimal interval for updating of diagnostic objects.





MAX_DIAGNOSTICS_UPDATE_INTERVAL

Milliseconds

86400000

Maximal interval for updating of diagnostic objects.





MAX_SESSIONS

Number

0

Maximal number of parallel sessions opened by clients, 0 for unlimited.





MAX_SESSIONS_PER_ENDPOINT

Number

0

Maximal number of parallel sessions opened by clients on a single endpoint, 0 for unlimited.





MAX_SUBSCRIPTIONS

Number

0

Maximal number of subscriptions created by clients, 0 for unlimited.





MAX_SUBSCRIPTIONS_PER_SESSION

Number

0

Maximal number of subscriptions per session, 0 for unlimited.





MAX_SUBSCRIPTION_LIFETIME

Number

120000

Maximal subscription lifetime.





MAX_MONITORED_ITEMS

Number

0

Maximal number of monitored items, 0 for unlimited.





MAX_MONITORED_ITEMS_PER_SUBSCRIPTION

Number

0

Maximal number of monitored items per session, 0 for unlimited.






4.5 Configuration templates

Several configuration templates are provided to make it easier to configure a new instance of the OPC UA server. These configurations may be used as a quick start templates for arbitrary configurations. Following configuration templates are provided:

  • Minimal - a minimal configuration with and unsecured endpoint and a running REXYGEN target on localhost,
  • Secured_communication - a configuration for secured endpoints without authentication,
  • Username_Authentication - a configuration for secured endpoints and authentication with user name and password,
  • Certificate_Authentication - a configuration for secured endpoints and authentication with client certificates,
  • Multi_Authentication - a configuration for multiple authentication policies,
  • Endpoints - a configuration with two endpoints,
  • Discovery - a configuration with registration to a discovery server,
  • Full - a complete configuration.

It is recommended to always modify parameters ADDRESS, COMPANY_URI_NAME, PROJECT_URI_NAME and INSTANCE_URI_NAME.

Chapter 5
Authentication and authorization

5.1 Roles and users

Five roles are defined in the OPC UA server: Anonymous, AuthorizedUser Observer, Operator and Supervisor. An AuthorizedUser is allowed to browse address space. An Observer is also allowed to read values of variables and blocks. An Operator has all the permissions as Observer and is also allowed to write values of variables and blocks and thus affect behaviour of a target algorithm. A Supervisor has unlimited permissions including utilisation of communication diagnostics and invocation of server methods. Access permissions are listed in table 5.1.


Table 5.1: Permissions






Permission Supervisor Operator Observer AuthorizedUser Anonymous












Browse X X X X






Reading values X X X






Writing values X X






Reading permissions X






Communication diagnostics X






Method invocation X







A role that is applied for a session is determined by a security policy that is applied on an endpoint and during authentication process. A client may only apply policies that are enabled and allowed on an endpoint. Security, authentication and authorization is ensured by a configuration of policies for endpoints, see chapter 4.4.5.

A valid path to a configuration file with roles, users and passwords has to be provided when authentication using user name and password is enabled. The configuration file is loaded during the server startup. Use RexOpcUaConfig tools to modify user accounts. This tool is integral part of REXYGEN installation.

5.2 Credentials INI file

The credentials INI file contains information about uses, their passwords and roles. This file contains five sections corresponding to OPC UA server roles: SUPERVISOR, OPERATOR, OBSERVER, AUTHORIZED_USER, ANONYMOUS. These sections contains pairs of users with encoded passwords. Passwords are encoded by SHA1 encoding of string: <password><username><OPTIONAL_ENCODING_SALT>. An example credential INI file is depicted bellow.

[SUPERVISOR]  
supervisor=718DA2408623AD7786E2E79AA700E8A8FBC49221  
 
[OPERATOR]  
operator=844BD4CBFF1FEF80251306E0E359243CC267DB2B

Chapter 6
Configuration Tool

RexOpcUaConfig is a graphical configuration tool of the OPC UA server for REXYGEN. It simplifies a process of a server configuration. It provides a certificate generation, ini file modification and administration of user accounts. Several example configurations are provided for beginners.

A whole content of the configuration ini file is shown on the Configuration tab, see picture 6.1). A content may be modified by a user and saved. Configuration is checked for common errors before it is saved. All errors found are listed in the Errors tab.


PIC

Figure 6.1: Configuration editor in RexOpcUaConfig

6.1 Certificates

Administration of server and client certificates is provided on the Certificates tab, see picture 6.2. All file paths are obtained from the configuration file. The configuration file must be present and all file paths must be valid, otherwise the tab is filled with a red color.

Client certificates are stored among various directories. RexOpcUaConfig makes it possible to create, open and delete these directories. Trusted client certificates are stored in the Trusted folder. All certificates of clients that tried to connect to the server and were rejected are stored in the Rejected directory.


PIC

Figure 6.2: Certificate administration

A special dialog is provided for certificate creation. The Passsword and Application URI fields are filled by values defined by APPLICATION_PRIVATE_KEY_PASSWORD a APPLICATION_URI configuration options.

The Subject field contains an arbitrary text. The Restriction field contains an IP address or domain that the certificate is bound to. The Application URI must match APPLICATION_URI configuration option. Certificate Settings affect certificate’s validity and used cipher.

A destination of generated file is is shown on Certificates tab, see picture 6.2. PEM and DER file format are used for generated certificate file and private key file.


PIC

Figure 6.3: Dialog for creation of a certificate

6.2 Authentication

The Authorization tab (see picture 6.4) contains settings for authentication and authorization. The tab is visible only when the CREDENTIALS_INI_PATH is set and valid. All user accounts are stored in this configuration file.

There is a simple graphical interface for creation of a user account (picture 6.5), modification (picture 6.6) and deletion.


PIC

Figure 6.4: User administration


PIC

Figure 6.5: Dialog for creation of a user account


PIC

Figure 6.6: Dialog for modification of a user account

6.3 Configuration examples

Several simple configuration templates are provided for beginners. (see chapter 4.5). An example configuration may be used as a quick start template for arbitrary configurations (see pictures 6.7, 6.8 and 6.9).

No template of configuration file for user accounts exists and the file must always be created from scratch. Please check, that OPTIONAL_ENCODING_SALT is set appropriately when copying or re-using the configuration file.


PIC

Figure 6.7: Loading of an example configuration


PIC

Figure 6.8: List of examples


PIC

Figure 6.9: Selected configuration

Chapter 7
Connection testing with OPC UA clients

Several OPC UA clients that are freely available may be used for testing of the OPC UA server. Their behavior and functionality may differ. UaEpert by Unified Automation GmbH and myScada are shortly introduced in this guide. Both anonymous and authenticated connections are demonstrated (see pictures 7.1, 7.2 and 7.3).


PIC

Figure 7.1: Endpoint setup without encryption


PIC

Figure 7.2: Authentication with user name and password


PIC

Figure 7.3: Endpoint policy settings

7.1 UaExpert

UaExpert is a universal and a fully functional OPC UA client that may be used for testing and verification of OPC UA connection and for a simple diagnostics. It supports wide range of OPC UA functionality.

UaExpert support three ways of authentication, encrypted connection, discovery service, reading data, writing data, monitoring of nodes, browsing address space, monitoring events, method invocation and more.

UaExpert invokes a certificate creation on a first startup. A generated certificate has to be copied to the server’s trusted certificates directory if an authentication using certificate is requested using option Settings > Manage Certificates > Copy Application Certificate To... (see picture 7.4).


PIC

Figure 7.4: UaExpert: Storing a trusted certificate

A connection with OPC UA server is established by clicking on "+" button. A dialog for connection configuration is opened. Advanced connection options are set in tab Advanced (see picture 7.5).


PIC

Figure 7.5: UaExpert: Anonymous connection


PIC

Figure 7.6: UaExpert: Connection with authentication

An established and working connection is indicated by a connected plug (see picture 7.7). A connection may be closed (unconnected plug) and re-established again. Connection options may be changed only in disconnected state (icon with a key). Authentication policy may be changed at any time (icon with a user). UaExper may have several connections established at the same time. Client configuration (including connections, monitored items etc.) may be saved and later loaded again.


PIC

Figure 7.7: UaExpert: Connecting to the server

A Data Access View document has to be created by clicking on a document icon, selecting option Data Access View and then clicking on Add (see picture 7.8). To monitor an item simply drag and drop corresponding node from address space to the document (see picture 7.9). A monitoring of the item starts immediately. The item may be deleted at any time. A value may be written to a monitored item by double-clicking on the item in the document and entering new value(see picture 7.10).


PIC

Figure 7.8: UaExpert: Selecting data for monitoring


PIC

Figure 7.9: UaExpert: Monitoring of variable u1


PIC

Figure 7.10: UaExpert: Writing to variable u1

A Event View document has to be created by clicking on a document icon, selecting option Event View and then clicking on Add (see picture 7.11). To monitor an item simply drag and drop corresponding node from address space to the Configuration area (see picture 7.12). All monitored events are listed in Events area. Event details are shown in the Details area. It is recommended to always monitor the Exec and the Server nodes of the OPC UA server for REXYGEN.


PIC

Figure 7.11: UaExpert: Adding monitored events


PIC

Figure 7.12: UaExpert: Monitoring events on Exec node

A simple read operation in UaExpert is performed by clicking on a node in the address space tree view. A value is shown in the right part of the node, see picture 7.13. A write operation is invoked by double-clicking on a node, see picture 7.14.


PIC

Figure 7.13: UaExpert: Reading variable u1


PIC

Figure 7.14: UaExpert: Writing variable u1

UaExpert supports a discovery service and shows all available OPC UA endpoints of registered servers (see picture 7.15). A user may expand a requested server in the tree view, select requested operation and set up an authentication policy to establish a connection. UaExper always checks a Local Discovery Server (LDS), a freely available discovery server (see chapter 4.4.6). Another option is to register a custom discovery server or OPC UA server directly.


PIC

Figure 7.15: UaExpert: Using discovery service

Inspect application logs that are available in the bottom panel (see picture 7.16) if a problem occurs with a connection.


PIC

Figure 7.16: UaExpert: Logging actions

7.2 myScada

mySCADA is an Human-Machine Interface tool that supports OPC UA. Not all OPC UA options are supported by mySCADA.

First, a new project has to be created in myPROJECT designer. Then open a connection tab, insert a new connection a select OPC UA. A configuration dialog is opened in which a connection with OPC UA is set, see picture 7.17.


PIC

Figure 7.17: mySCADA: An anonymous connection

A data tag has to be defined in the next step. The tag contains a reference to a single node on OPC UA server that contains the requested value, see picture 7.18. The tag may be then used to show a value in HMI application, see picture 7.19. Download a final project to the device and use myView to show it.


PIC

Figure 7.18: mySCADA: Tag creation


PIC

Figure 7.19: mySCADA: Using defined tag in the project

Use myView to show HMI on a device. A proper value is shown and updated from OPC UA server, see picture 7.20. An error is indicated when a connection error occurs, authentication fails or a tag is not valid, see picture 7.25.


PIC

Figure 7.20: mySCADA: Running HMI


PIC

Figure 7.21: mySCADA: Data tag is not available

An endpoint has to have a /None/None suffix to mySCADA work properly with unencrypted connection. A policy ID for anonymous login must be set to zero, see picture 7.1.

To configure user name and password authentication policy a UserNameIdentityToken policy has to be set (see pictures 7.22 and 7.23) and user name and password must be supplied (see picture 7.24).


PIC

Figure 7.22: mySCADA: Authentication using user name and password


PIC

Figure 7.23: mySCADA: Endpoint policy settings


PIC

Figure 7.24: mySCADA: Authentication using user name and password

An error is indicated when authentication fails, see picture 7.25.


PIC

Figure 7.25: mySCADA: Connection error

Bibliography


Documentation reference number: 16710

2024 © REX Controls s.r.o., www.rexygen.com